Security and Compliance

I.T. Security is Critical

We are Security and Compliance experts.  Below are just some of the ways MainSail Data Can save you time, data, stress and money.

NETWORK SECURITY

With security breaches arising on multiple fronts, companies, healthcare systems, governmental and educational entities, and individuals started to realize how real the threat of cyber security attacks is.

NETWORK SECURITY

MainSail Data offers the industry’s best Next-Generation Firewalls and Unified Threat Management (UTM). This allows us to provide our clients with malware protection, intrusion prevention, unparalleled control, application intelligence, and real-time traffic visualization.

DATA SECURITY

Cybersecurity spending to exceed $1 trillion from 2017 to 2021. The rising tide of cyber crime has pushed information security (a subset of cybersecurity) spending to more than $86.4 billion in 2017,

DATA SECURITY

When your data’s secure, your organization can focus on growth and prosperity. Information is the fuel that keeps your business moving forward. Keeping sensitive information secure across all channels is absolutely needed in today’s business world.

EMAIL SECURITY

The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016. More than 4,000 ransom-ware attacks occur every day.

EMAIL SECURITY

Email security is the PRIMARY reason that 88% of companies today experience data loss? Cyber criminals routinely launch phishing attacks, as well as malicious file attachments into emails, to launch an advanced cyber attack. These email attacks often pass by conventional signature-based defenses that use tools such as antivirus (AV).

Let’s face it. Users are the weakest link in any network security scenario.  Since they are the reason we have an Information Technology Department and more to the point… a job… we need to make sure we take care of them and they take care of us. That’s why they come first on this list.  We will protect your data, your business and your money.

  • Training
  • Unique accounts
  • Separation between normal user and privileged user accounts
  • Multifactor authentication
  • Up to date information
  • Review of group memberships when roles change
  • No sharing of accounts between test and production, or between any two external services.
  • Disable stale accounts. Delete the really old ones.

The best laid plans of mice and men oft go awry, and nowhere can this happen more quickly than where you try to implement network security without a plan, in the form of policies. Policies need to be created, socialized, approved by management, and made official to hold any weight in the environment, and should be used as the ultimate reference when making security decisions. As an example, we all know that sharing passwords is bad, but until we can point to the company policy that says it is bad, we cannot hold our users to account should they share a password with another. Here’s a short list of the policies every company with more than two employees should have to help secure their network.

  1. Acceptable Use Policy
  2. Internet Access Policy
  3. Email and Communications Policy
  4. Network Security Policy
  5. Remote Access Policy
  6. BYOD Policy
  7. Encryption Policy
  8. Privacy Policy

Willie Sutton, a notorious American criminal, when asked why he robbed banks, answered “because that’s where the money is.” If you could ask a hacker why he or she breaks into servers they would probably reply with a similar answer “because that’s where the data is.” In today’s society, data is a fungible commodity that is easy to sell or trade, and your servers are where most of your company’s most valuable data resides. Here’s some tips for securing those servers against all enemies, both foreign and domestic. Create a server deployment checklist, and make sure all of the following are on the list, and that each server you deploy complies 100% before it goes into production.

  • Server list
  • Responsible party
  • Naming conventions
  • Network Configuration
  • IPAM
  • Patching
  • Antivirus
  • Host intrusion prevention/firewall
  • Remote access
  • UPS and power saving
  • Domain joined
  • Administrator account renamed and password set
  • Local group memberships set and permissions assigned
  • Correct OU with appropriate policies
  • Confirm it is reporting to management consoles
  • Unnecessary services disabled
  • SNMP configured
  • Agents installed
  • Backups
  • Restores
  • Vulnerability scan
  • Signed into production

Making sure that the workstations are secure is just as important as with your servers. In some cases it’s even more so, since your servers benefit from the physical security of your datacenter, while workstations are frequently laptops sitting on table tops in coffee shops while your users grab another latte. Don’t overlook the importance of making sure your workstations are as secure as possible.

  • Workstation list
  • Assigned user
  • Naming conventions
  • Network Configuration
  • Patching
  • Antivirus
  • Host intrusion prevention/firewall
  • Remote access
  • Power saving
  • Domain joined
  • Administrator account renamed and password set
  • Local group memberships set and permissions assigned
  • Correct OU with appropriate policies
  • Confirm its reporting to management consoles
  • Backups/ Restores
  • Local encryption
  • Vulnerability scan

Your network infrastructure is easy to overlook, but also critical to secure and maintain. We’ll start with some recommendations for all network equipment, and then look at some platform specific recommendations.

  • Network hardware list
  • Network Configuration
  • IPAM
  • Patching
  • Remote access
  • Unique credentials
  • SNMP configured
  • Backups/Restores
  • Vulnerability scan
  • VLANs
  • Promiscuous devices and hubs
  • Disabled ports
  • Explicit permits, implicit denies
  • Logging and alerts
  • Routing protocols
  • Weekly external scans scheduled
    • Configure your vulnerability scanning application to scan all of your external address space weekly.
  • Diffs compared weekly
    • Validate any differences from one week to the next against your change control procedures to make sure no one has enabled an unapproved service or connected a rogue host.
  • Internal scans scheduled monthly
    • Perform monthly internal scans to help ensure that no rogue or unmanaged devices are on the network, and that everything is up to date on patches.
  • Tape rotation established
    • Make sure you have a tape rotation established that tracks the location, purpose, and age of all tapes. Never repurpose tapes that were used to backup highly sensitive data for less secure purposes.
  • Old tapes destroyed
    • When a tape has reached its end of life, destroy it to ensure no data can be recovered from it.
  • Secure offsite storage
    • If you are going to store tapes offsite, use a reputable courier service that offers secure storage.
  • Encryption
    • Even reputable courier services have lost tapes, so ensure that any tape transported offsite, whether through a service or by an employee, is encrypted to protect data against accidental loss.
  • Restores confirmed regularly
    • Backups are worthless if they cannot be restored. Verify your backups at least once a month by performing test restores to ensure your data is safe.
  • Restricted access to tapes, backup operators groups
    • Backup tapes contain all data, and the backup operators can bypass file level security in Windows so they can actually back up all data. Secure the physical access to tapes, and restrict membership in the backup operators group just like you do to the domain admins group.
WORRY FREE SECURITY

MainSail’s Data Security Solutions:

  • Offer end-users complete flexibility over where, how and with which device they want to work
  • Secure a company’s entire infrastructure of data, networks, and devices
  • Utilize centrally-managed endpoint security
  • Ensure compliance for industries that must comply with government regulations in regards to data security.

network-4

 Email Security

Did you know that email security is the PRIMARY reason
that 88% of companies today experience data loss?

Cyber criminals routinely launch spear phishing attacks, as well as malicious file attachments and URLs into emails, to launch an advanced cyber attack. These email attacks often pass by conventional signature-based defenses that use tools such as antivirus (AV) and spam filters.

MainSail Data’s email security solutions protect your data, exceed compliance requirements and empower your business by:

  • Protecting your company from cyber attacks (and compliance concerns) by effectively blocking viruses, zombies, phishing attacks and spam.
  • Utilizing an effective array of powerful, Next-generation threat detection strategies and tools.
  • Ensuring the secure exchange of sensitive information via email.
  • Archiving for compliance reasons and auditing all accounts and access controls to protect against compliance infractions.

Security and Compliance

MainSail Data specializes in the expert planning, implementation, auditing, monitoring, and management of complete security solutions. Security and Compliance  is certainly not something you can “set and forget” – nor is it a series of point solutions that are simply strung together. At MainSail Data, we believe in a proactive approach to your business’s safety that results in a well-designed security architecture that addresses all aspects of security.

Incredible Shortcodes Give You The Tools You Need

[fusion_fusionslider name=”avada_small” class=”” id=”” /]

Lid est laborum dolo rumes fugats untras. Etha rums ser quidem rerum facilis dolores nemis onis fugats vitaes nemo minima rerums unsers sadips amets sadips ips. Ut enim ad minim veniam, quis nostrud Neque porro quisquam est, qui dolorem ipsum. Quia dolor sit amet, consectetur, adipisci amets uns. Rumes fugats untras. Etha rums ser quidem nemo minima rerums unsers sadips rerums.

Hey, What’s This Cool Text Right Here Do?
  • The #1 Selling Theme On Themeforest
  • We Have The Most Dedicated Support Team
  • Constant Updates Added With New Features
  • Power Elite Author Gives You Peace of Mind
  • Join The Growing Community of Avada Users
95%
Users
Avada

Amazing Flexibility To Build Beautiful, Unique Websites

Lid est laborum dolo rumes fugats untras. Etha rums ser quidem rerum facilis dolors nemis onis.

Keep In Touch With Our Incredibly Customizable Social Icons! 25 Total Social Networks
Purchase Now

Avada is the ultimate multi-purpose wordpress theme!

Loaded with awesome features, premium sliders, unlimited colors, advanced theme options & much more!
Purchase Now

Call Now (772) 794-1194

Let MainSail Data help your business sail smoothly through the rough waters of the internet.